GhostPoster Browser Extensions Found Malicious, Installed 840,000 Times

ago 2 hours
GhostPoster Browser Extensions Found Malicious, Installed 840,000 Times

Recent reports have unveiled a series of 17 dangerous browser extensions linked to the GhostPoster campaign. These extensions have been identified across major browsers, including Chrome, Firefox, and Edge, accumulating approximately 840,000 installations in total. The GhostPoster campaign was initially reported by Koi Security researchers back in December.

Malicious Functionality of GhostPoster Extensions

The identified extensions were found to contain malicious JavaScript code hidden within their logo images. This code performs various nefarious activities, such as:

  • Monitoring browser activity
  • Injecting a backdoor into the browser
  • Tracking online behavior
  • Hijacking affiliate links on e-commerce websites
  • Injecting invisible iframes for ad and click fraud

Details on the 17 Malicious Extensions

A recent report by LayerX confirmed that the GhostPoster campaign continues to evolve despite its previous exposure. The list of the 17 malicious extensions includes:

Extension Name Installations
Google Translate in Right Click 522,398
Translate Selected Text with Google 159,645
Ads Block Ultimate 48,078
Floating Player – PiP Mode 40,824
Convert Everything 17,171
YouTube Download 11,458
One Key Translate 10,785
AdBlocker 10,155
Save Image to Pinterest on Right Click 6,517
Instagram Downloader 3,807
RSS Feed 2,781
Cool Cursor 2,254
Full Page Screenshot 2,000
Amazon Price History 1,197
Color Enhancer 712
Translate Selected Text with Right Click 283
Page Screenshot Clipper 86

Campaign Origin and Continued Threat

The GhostPoster campaign appears to have started on Microsoft Edge before expanding into Firefox and Chrome. LayerX’s findings indicate some of these extensions have been available in browser stores since 2020, which shows the campaign’s long-term success.

Technological Evolution

Researchers from LayerX noted that the malicious tactics have evolved, particularly with the ‘Instagram Downloader’ extension. This variant moves the harmful code into the extension’s background script. It also utilizes a bundled image file to hide the payload, enhancing the strategy’s complexity.

The background script identifies specific data within the image file, stores it, and ultimately decodes it to execute malicious JavaScript. This method indicates a shift toward longer dormancy and greater resilience against detection.

Current Status and User Safety

While the newly identified extensions have been removed from Mozilla’s and Microsoft’s add-on stores, users who installed them might remain vulnerable. BleepingComputer reached out to Google, confirming that all related extensions have been eliminated from the Chrome Web Store. Users should take precautions and regularly monitor their installed extensions to safeguard their online security.